Browse code

kernels: Update to version 4.9.163

Drop 0001-net-create-skb_gso_validate_mac_len.patch and
0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
as they were included in 4.9.159.

Change-Id: I904491db574486280bd6cb9d6ea6420ffd8a420b
Reviewed-on: http://photon-jenkins.eng.vmware.com:8082/6872
Tested-by: gerrit-photon <photon-checkins@vmware.com>
Reviewed-by: Bo Gan <ganb@vmware.com>

Srivatsa S. Bhat (VMware) authored on 2019/03/15 04:17:39
Showing 7 changed files
... ...
@@ -1,6 +1,6 @@
1 1
 Summary:	Linux API header files
2 2
 Name:		linux-api-headers
3
-Version:	4.9.154
3
+Version:	4.9.163
4 4
 Release:	1%{?dist}
5 5
 License:	GPLv2
6 6
 URL:		http://www.kernel.org/
... ...
@@ -8,7 +8,7 @@ Group:		System Environment/Kernel
8 8
 Vendor:		VMware, Inc.
9 9
 Distribution: Photon
10 10
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
11
-%define sha1 linux=1a506bd238df9dbdc81e6b74abc0bb751a45eb5b
11
+%define sha1 linux=8c716f0109f819a1e361853631ff885994c6b1d9
12 12
 BuildArch:	noarch
13 13
 Patch0:         Implement-the-f-xattrat-family-of-functions.patch
14 14
 %description
... ...
@@ -27,6 +27,8 @@ find /%{buildroot}%{_includedir} \( -name .install -o -name ..install.cmd \) -de
27 27
 %defattr(-,root,root)
28 28
 %{_includedir}/*
29 29
 %changelog
30
+*   Thu Mar 14 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.9.163-1
31
+-   Update to version 4.9.163
30 32
 *   Mon Feb 04 2019 Ajay Kaher <akaher@vmware.com> 4.9.154-1
31 33
 -   Update to version 4.9.154
32 34
 *   Mon Nov 26 2018 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.9.140-1
33 35
deleted file mode 100644
... ...
@@ -1,172 +0,0 @@
1
-From 2b16f048729bf35e6c28a40cbfad07239f9dcd90 Mon Sep 17 00:00:00 2001
2
-From: Daniel Axtens <dja@axtens.net>
3
-Date: Wed, 31 Jan 2018 14:15:33 +1100
4
-Subject: [PATCH] net: create skb_gso_validate_mac_len()
5
-
6
-If you take a GSO skb, and split it into packets, will the MAC
7
-length (L2 + L3 + L4 headers + payload) of those packets be small
8
-enough to fit within a given length?
9
-
10
-Move skb_gso_mac_seglen() to skbuff.h with other related functions
11
-like skb_gso_network_seglen() so we can use it, and then create
12
-skb_gso_validate_mac_len to do the full calculation.
13
-
14
-Signed-off-by: Daniel Axtens <dja@axtens.net>
15
-Signed-off-by: David S. Miller <davem@davemloft.net>
16
-Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu>
17
- include/linux/skbuff.h | 16 +++++++++++++
18
- net/core/skbuff.c      | 63 +++++++++++++++++++++++++++++++++++++++-----------
19
- net/sched/sch_tbf.c    | 10 --------
20
- 3 files changed, 66 insertions(+), 23 deletions(-)
21
-
22
-diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h
23
-index 1b3a2f9..5d34da2 100644
24
-+++ b/include/linux/skbuff.h
25
-@@ -3077,6 +3077,7 @@ int skb_shift(struct sk_buff *tgt, struct sk_buff *skb, int shiftlen);
26
- void skb_scrub_packet(struct sk_buff *skb, bool xnet);
27
- unsigned int skb_gso_transport_seglen(const struct sk_buff *skb);
28
- bool skb_gso_validate_mtu(const struct sk_buff *skb, unsigned int mtu);
29
-+bool skb_gso_validate_mac_len(const struct sk_buff *skb, unsigned int len);
30
- struct sk_buff *skb_segment(struct sk_buff *skb, netdev_features_t features);
31
- struct sk_buff *skb_vlan_untag(struct sk_buff *skb);
32
- int skb_ensure_writable(struct sk_buff *skb, int write_len);
33
-@@ -3855,6 +3856,21 @@ static inline unsigned int skb_gso_network_seglen(const struct sk_buff *skb)
34
- 	return hdr_len + skb_gso_transport_seglen(skb);
35
- }
36
- 
37
-+/**
38
-+ * skb_gso_mac_seglen - Return length of individual segments of a gso packet
39
-+ *
40
-+ * @skb: GSO skb
41
-+ *
42
-+ * skb_gso_mac_seglen is used to determine the real size of the
43
-+ * individual segments, including MAC/L2, Layer3 (IP, IPv6) and L4
44
-+ * headers (TCP/UDP).
45
-+ */
46
-+static inline unsigned int skb_gso_mac_seglen(const struct sk_buff *skb)
47
-+{
48
-+	unsigned int hdr_len = skb_transport_header(skb) - skb_mac_header(skb);
49
-+	return hdr_len + skb_gso_transport_seglen(skb);
50
-+}
51
-+
52
- /* Local Checksum Offload.
53
-  * Compute outer checksum based on the assumption that the
54
-  * inner checksum will be offloaded later.
55
-diff --git a/net/core/skbuff.c b/net/core/skbuff.c
56
-index 9f697b0..5945bf4 100644
57
-+++ b/net/core/skbuff.c
58
-@@ -4442,37 +4442,74 @@ unsigned int skb_gso_transport_seglen(const struct sk_buff *skb)
59
- EXPORT_SYMBOL_GPL(skb_gso_transport_seglen);
60
- 
61
- /**
62
-- * skb_gso_validate_mtu - Return in case such skb fits a given MTU
63
-+ * skb_gso_size_check - check the skb size, considering GSO_BY_FRAGS
64
-  *
65
-- * @skb: GSO skb
66
-- * @mtu: MTU to validate against
67
-+ * There are a couple of instances where we have a GSO skb, and we
68
-+ * want to determine what size it would be after it is segmented.
69
-  *
70
-- * skb_gso_validate_mtu validates if a given skb will fit a wanted MTU
71
-- * once split.
72
-+ * We might want to check:
73
-+ * -    L3+L4+payload size (e.g. IP forwarding)
74
-+ * - L2+L3+L4+payload size (e.g. sanity check before passing to driver)
75
-+ *
76
-+ * This is a helper to do that correctly considering GSO_BY_FRAGS.
77
-+ *
78
-+ * @seg_len: The segmented length (from skb_gso_*_seglen). In the
79
-+ *           GSO_BY_FRAGS case this will be [header sizes + GSO_BY_FRAGS].
80
-+ *
81
-+ * @max_len: The maximum permissible length.
82
-+ *
83
-+ * Returns true if the segmented length <= max length.
84
-  */
85
--bool skb_gso_validate_mtu(const struct sk_buff *skb, unsigned int mtu)
86
--{
87
-+static inline bool skb_gso_size_check(const struct sk_buff *skb,
88
-+				      unsigned int seg_len,
89
-+				      unsigned int max_len) {
90
- 	const struct skb_shared_info *shinfo = skb_shinfo(skb);
91
- 	const struct sk_buff *iter;
92
--	unsigned int hlen;
93
--
94
--	hlen = skb_gso_network_seglen(skb);
95
- 
96
- 	if (shinfo->gso_size != GSO_BY_FRAGS)
97
--		return hlen <= mtu;
98
-+		return seg_len <= max_len;
99
- 
100
- 	/* Undo this so we can re-use header sizes */
101
--	hlen -= GSO_BY_FRAGS;
102
-+	seg_len -= GSO_BY_FRAGS;
103
- 
104
- 	skb_walk_frags(skb, iter) {
105
--		if (hlen + skb_headlen(iter) > mtu)
106
-+		if (seg_len + skb_headlen(iter) > max_len)
107
- 			return false;
108
- 	}
109
- 
110
- 	return true;
111
- }
112
-+
113
-+/**
114
-+ * skb_gso_validate_mtu - Return in case such skb fits a given MTU
115
-+ *
116
-+ * @skb: GSO skb
117
-+ * @mtu: MTU to validate against
118
-+ *
119
-+ * skb_gso_validate_mtu validates if a given skb will fit a wanted MTU
120
-+ * once split.
121
-+ */
122
-+bool skb_gso_validate_mtu(const struct sk_buff *skb, unsigned int mtu)
123
-+{
124
-+	return skb_gso_size_check(skb, skb_gso_network_seglen(skb), mtu);
125
-+}
126
- EXPORT_SYMBOL_GPL(skb_gso_validate_mtu);
127
- 
128
-+/**
129
-+ * skb_gso_validate_mac_len - Will a split GSO skb fit in a given length?
130
-+ *
131
-+ * @skb: GSO skb
132
-+ * @len: length to validate against
133
-+ *
134
-+ * skb_gso_validate_mac_len validates if a given skb will fit a wanted
135
-+ * length once split, including L2, L3 and L4 headers and the payload.
136
-+ */
137
-+bool skb_gso_validate_mac_len(const struct sk_buff *skb, unsigned int len)
138
-+{
139
-+	return skb_gso_size_check(skb, skb_gso_mac_seglen(skb), len);
140
-+}
141
-+EXPORT_SYMBOL_GPL(skb_gso_validate_mac_len);
142
-+
143
- static struct sk_buff *skb_reorder_vlan_header(struct sk_buff *skb)
144
- {
145
- 	int mac_len;
146
-diff --git a/net/sched/sch_tbf.c b/net/sched/sch_tbf.c
147
-index 303355c..ad60a45 100644
148
-+++ b/net/sched/sch_tbf.c
149
-@@ -142,16 +142,6 @@ static u64 psched_ns_t2l(const struct psched_ratecfg *r,
150
- 	return len;
151
- }
152
- 
153
--/*
154
-- * Return length of individual segments of a gso packet,
155
-- * including all headers (MAC, IP, TCP/UDP)
156
-- */
157
--static unsigned int skb_gso_mac_seglen(const struct sk_buff *skb)
158
--{
159
--	unsigned int hdr_len = skb_transport_header(skb) - skb_mac_header(skb);
160
--	return hdr_len + skb_gso_transport_seglen(skb);
161
--}
162
--
163
- /* GSO packet is too big, segment it so that tbf can transmit
164
-  * each segment in time
165
-  */
166
-2.7.4
167
-
168 1
deleted file mode 100644
... ...
@@ -1,58 +0,0 @@
1
-From 8914a595110a6eca69a5e275b323f5d09e18f4f9 Mon Sep 17 00:00:00 2001
2
-From: Daniel Axtens <dja@axtens.net>
3
-Date: Wed, 31 Jan 2018 14:15:34 +1100
4
-Subject: [PATCH] bnx2x: disable GSO where gso_size is too big for hardware
5
-
6
-If a bnx2x card is passed a GSO packet with a gso_size larger than
7
-~9700 bytes, it will cause a firmware error that will bring the card
8
-down:
9
-
10
-bnx2x: [bnx2x_attn_int_deasserted3:4323(enP24p1s0f0)]MC assert!
11
-bnx2x: [bnx2x_mc_assert:720(enP24p1s0f0)]XSTORM_ASSERT_LIST_INDEX 0x2
12
-bnx2x: [bnx2x_mc_assert:736(enP24p1s0f0)]XSTORM_ASSERT_INDEX 0x0 = 0x00000000 0x25e43e47 0x00463e01 0x00010052
13
-bnx2x: [bnx2x_mc_assert:750(enP24p1s0f0)]Chip Revision: everest3, FW Version: 7_13_1
14
-... (dump of values continues) ...
15
-
16
-Detect when the mac length of a GSO packet is greater than the maximum
17
-packet size (9700 bytes) and disable GSO.
18
-
19
-Signed-off-by: Daniel Axtens <dja@axtens.net>
20
-Reviewed-by: Eric Dumazet <edumazet@google.com>
21
-Signed-off-by: David S. Miller <davem@davemloft.net>
22
-Signed-off-by: Srivatsa S. Bhat <srivatsa@csail.mit.edu>
23
- drivers/net/ethernet/broadcom/bnx2x/bnx2x_main.c | 18 ++++++++++++++++++
24
- 1 file changed, 18 insertions(+)
25
-
26
-diff --git a/drivers/net/ethernet/broadcom/bnx2x/bnx2x_main.c b/drivers/net/ethernet/broadcom/bnx2x/bnx2x_main.c
27
-index 554c408..72d90b2 100644
28
-+++ b/drivers/net/ethernet/broadcom/bnx2x/bnx2x_main.c
29
-@@ -12930,6 +12930,24 @@ static netdev_features_t bnx2x_features_check(struct sk_buff *skb,
30
- 					      struct net_device *dev,
31
- 					      netdev_features_t features)
32
- {
33
-+	/*
34
-+	 * A skb with gso_size + header length > 9700 will cause a
35
-+	 * firmware panic. Drop GSO support.
36
-+	 *
37
-+	 * Eventually the upper layer should not pass these packets down.
38
-+	 *
39
-+	 * For speed, if the gso_size is <= 9000, assume there will
40
-+	 * not be 700 bytes of headers and pass it through. Only do a
41
-+	 * full (slow) validation if the gso_size is > 9000.
42
-+	 *
43
-+	 * (Due to the way SKB_BY_FRAGS works this will also do a full
44
-+	 * validation in that case.)
45
-+	 */
46
-+	if (unlikely(skb_is_gso(skb) &&
47
-+		     (skb_shinfo(skb)->gso_size > 9000) &&
48
-+		     !skb_gso_validate_mac_len(skb, 9700)))
49
-+		features &= ~NETIF_F_GSO_MASK;
50
-+
51
- 	features = vlan_features_check(skb, features);
52
- 	return vxlan_features_check(skb, features);
53
- }
54
-2.7.4
55
-
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux-aws
4
-Version:        4.9.154
5
-Release:        3%{?kat_build:.%kat_build}%{?dist}
4
+Version:        4.9.163
5
+Release:        1%{?kat_build:.%kat_build}%{?dist}
6 6
 License:    	GPLv2
7 7
 URL:        	http://www.kernel.org/
8 8
 Group:        	System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution: 	Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=1a506bd238df9dbdc81e6b74abc0bb751a45eb5b
12
+%define sha1 linux=8c716f0109f819a1e361853631ff885994c6b1d9
13 13
 Source1:	config-aws
14 14
 Source2:	initramfs.trigger
15 15
 # common
... ...
@@ -47,9 +47,6 @@ Patch30:        vmxnet3-avoid-xmit-reset-due-to-a-race-in-vmxnet3.patch
47 47
 Patch31:        vmxnet3-use-correct-flag-to-indicate-LRO-feature.patch
48 48
 Patch32:        netfilter-ipset-pernet-ops-must-be-unregistered-last.patch
49 49
 Patch33:        vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch
50
-# Fixes for CVE-2018-1000026
51
-Patch34:        0001-net-create-skb_gso_validate_mac_len.patch
52
-Patch35:        0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
53 50
 # Fix for CVE-2018-8043
54 51
 Patch38:        0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch
55 52
 Patch42:        0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
... ...
@@ -220,8 +217,6 @@ This package contains the 'perf' performance analysis tools for Linux kernel.
220 220
 %patch31 -p1
221 221
 %patch32 -p1
222 222
 %patch33 -p1
223
-%patch34 -p1
224
-%patch35 -p1
225 223
 %patch38 -p1
226 224
 %patch42 -p1
227 225
 %patch43 -p1
... ...
@@ -440,6 +435,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
440 440
 /usr/share/doc/*
441 441
 
442 442
 %changelog
443
+*   Thu Mar 14 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.9.163-1
444
+-   Update to version 4.9.163
443 445
 *   Mon Feb 25 2019 Ajay Kaher <akaher@vmware.com> 4.9.154-3
444 446
 -   Fix CVE-2018-16882
445 447
 *   Thu Feb 21 2019 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.9.154-2
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux-esx
4
-Version:        4.9.154
5
-Release:        2%{?dist}
4
+Version:        4.9.163
5
+Release:        1%{?dist}
6 6
 License:        GPLv2
7 7
 URL:            http://www.kernel.org/
8 8
 Group:          System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution:   Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=1a506bd238df9dbdc81e6b74abc0bb751a45eb5b
12
+%define sha1 linux=8c716f0109f819a1e361853631ff885994c6b1d9
13 13
 Source1:        config-esx
14 14
 Source2:        initramfs.trigger
15 15
 # common
... ...
@@ -43,9 +43,6 @@ Patch30:        vmxnet3-avoid-xmit-reset-due-to-a-race-in-vmxnet3.patch
43 43
 Patch31:        vmxnet3-use-correct-flag-to-indicate-LRO-feature.patch
44 44
 Patch32:        netfilter-ipset-pernet-ops-must-be-unregistered-last.patch
45 45
 Patch33:        vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch
46
-# Fixes for CVE-2018-1000026
47
-Patch34:        0001-net-create-skb_gso_validate_mac_len.patch
48
-Patch35:        0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
49 46
 # Fix for CVE-2018-8043
50 47
 Patch38:        0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch
51 48
 Patch42:        0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
... ...
@@ -125,8 +122,6 @@ The Linux package contains the Linux kernel doc files
125 125
 %patch31 -p1
126 126
 %patch32 -p1
127 127
 %patch33 -p1
128
-%patch34 -p1
129
-%patch35 -p1
130 128
 %patch38 -p1
131 129
 %patch42 -p1
132 130
 %patch43 -p1
... ...
@@ -229,6 +224,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
229 229
 /usr/src/linux-headers-%{uname_r}
230 230
 
231 231
 %changelog
232
+*   Thu Mar 14 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.9.163-1
233
+-   Update to version 4.9.163
232 234
 *   Thu Feb 21 2019 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.9.154-2
233 235
 -   Fix CVE-2019-8912
234 236
 *   Mon Feb 04 2019 Ajay Kaher <akaher@vmware.com> 4.9.154-1
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux-secure
4
-Version:        4.9.154
5
-Release:        3%{?kat_build:.%kat_build}%{?dist}
4
+Version:        4.9.163
5
+Release:        1%{?kat_build:.%kat_build}%{?dist}
6 6
 License:        GPLv2
7 7
 URL:            http://www.kernel.org/
8 8
 Group:          System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution:   Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=1a506bd238df9dbdc81e6b74abc0bb751a45eb5b
12
+%define sha1 linux=8c716f0109f819a1e361853631ff885994c6b1d9
13 13
 Source1:        config-secure
14 14
 Source2:        aufs4.9.tar.gz
15 15
 %define sha1 aufs=ebe716ce4b638a3772c7cd3161abbfe11d584906
... ...
@@ -53,9 +53,6 @@ Patch32:        vmxnet3-avoid-xmit-reset-due-to-a-race-in-vmxnet3.patch
53 53
 Patch33:        vmxnet3-use-correct-flag-to-indicate-LRO-feature.patch
54 54
 Patch34:        netfilter-ipset-pernet-ops-must-be-unregistered-last.patch
55 55
 Patch35:        vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch
56
-# Fixes for CVE-2018-1000026
57
-Patch36:        0001-net-create-skb_gso_validate_mac_len.patch
58
-Patch37:        0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
59 56
 # Fix for CVE-2018-8043
60 57
 Patch40:        0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch
61 58
 Patch44:        0001-hwrng-rdrand-Add-RNG-driver-based-on-x86-rdrand-inst.patch
... ...
@@ -186,8 +183,6 @@ EOF
186 186
 %patch33 -p1
187 187
 %patch34 -p1
188 188
 %patch35 -p1
189
-%patch36 -p1
190
-%patch37 -p1
191 189
 %patch40 -p1
192 190
 %patch44 -p1
193 191
 %patch45 -p1
... ...
@@ -330,6 +325,8 @@ ln -sf linux-%{uname_r}.cfg /boot/photon.cfg
330 330
 /usr/src/linux-headers-%{uname_r}
331 331
 
332 332
 %changelog
333
+*   Thu Mar 14 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.9.163-1
334
+-   Update to version 4.9.163
333 335
 *   Mon Feb 25 2019 Ajay Kaher <akaher@vmware.com> 4.9.154-3
334 336
 -   Fix CVE-2018-16882
335 337
 *   Thu Feb 21 2019 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.9.154-2
... ...
@@ -1,15 +1,15 @@
1 1
 %global security_hardening none
2 2
 Summary:        Kernel
3 3
 Name:           linux
4
-Version:        4.9.154
5
-Release:        3%{?kat_build:.%kat_build}%{?dist}
4
+Version:        4.9.163
5
+Release:        1%{?kat_build:.%kat_build}%{?dist}
6 6
 License:    	GPLv2
7 7
 URL:        	http://www.kernel.org/
8 8
 Group:        	System Environment/Kernel
9 9
 Vendor:         VMware, Inc.
10 10
 Distribution: 	Photon
11 11
 Source0:        http://www.kernel.org/pub/linux/kernel/v4.x/linux-%{version}.tar.xz
12
-%define sha1 linux=1a506bd238df9dbdc81e6b74abc0bb751a45eb5b
12
+%define sha1 linux=8c716f0109f819a1e361853631ff885994c6b1d9
13 13
 Source1:	config
14 14
 Source2:	initramfs.trigger
15 15
 %define ena_version 1.1.3
... ...
@@ -51,9 +51,6 @@ Patch31:        vmxnet3-use-correct-flag-to-indicate-LRO-feature.patch
51 51
 # To fix kernel PANIC in cascade
52 52
 Patch32:        netfilter-ipset-pernet-ops-must-be-unregistered-last.patch
53 53
 Patch33:        vmxnet3-fix-incorrect-dereference-when-rxvlan-is-disabled.patch
54
-# Fixes for CVE-2018-1000026
55
-Patch34:        0001-net-create-skb_gso_validate_mac_len.patch
56
-Patch35:        0002-bnx2x-disable-GSO-where-gso_size-is-too-big-for-hard.patch
57 54
 # Fix for CVE-2018-8043
58 55
 Patch38:        0001-net-phy-mdio-bcm-unimac-fix-potential-NULL-dereferen.patch
59 56
 
... ...
@@ -187,8 +184,6 @@ This package contains the 'perf' performance analysis tools for Linux kernel.
187 187
 %patch31 -p1
188 188
 %patch32 -p1
189 189
 %patch33 -p1
190
-%patch34 -p1
191
-%patch35 -p1
192 190
 %patch38 -p1
193 191
 %patch42 -p1
194 192
 %patch43 -p1
... ...
@@ -378,6 +373,8 @@ ln -sf %{name}-%{uname_r}.cfg /boot/photon.cfg
378 378
 /usr/share/doc/*
379 379
 
380 380
 %changelog
381
+*   Thu Mar 14 2019 Srivatsa S. Bhat (VMware) <srivatsa@csail.mit.edu> 4.9.163-1
382
+-   Update to version 4.9.163
381 383
 *   Mon Feb 25 2019 Ajay Kaher <akaher@vmware.com> 4.9.154-3
382 384
 -   Fix CVE-2018-16882
383 385
 *   Thu Feb 21 2019 Him Kalyan Bordoloi <bordoloih@vmware.com> 4.9.154-2